DoD Cyber Awareness FY24
Under which Cyberspace Protection Condition (CPCON) is the priority focus limited to critical and essential functions?
CPCON 3
Which of the following is an appropriate use of a DoD Public Key Infrastructure (PKI) token?
Do not use a token approved for NIPRNet on SIPRNet
Which of the following is true of spillage?
It can be either inadvertent or intentional
Which of the following statements is true of DoD Unclassified data?
It poses no risk to the safety of government personnel, missions, or systems.
Which of the following is a best practice when browsing the internet?
Only accept cookies from reputable, trusted websites
Which of the following is true of Sensitive Compartmented Information Facilities (SCIFs)?
Personnel with access to a SCIF have a need-to-know for all information processed within the SCIF.
You receive an e-mail with a link to schedule a time to update software on your government furnished laptop. Your IT department has not schedule software updates like this in the past and has not announced this software update. The e-mail is not digitally signed. What action should you take?
Report the e-mail to your security POC or help desk.
Which of the following is NOT a way that malicious code can spread?
Running a virus scan
Terry sees a post on her social media feed that says there is smoke billowing from the Pentagon. The post includes a video that shows smoke billowing from a building that is not readily identifiable as the Pentagon. Terry is not familiar with the source of the post. Which of the following escribes what Terry has likely seen?
This is probably disinformation unless Terry can verify it on a legitimate news site.
Which of the following is true of transmitting or transporting Sensitive Compartmented Information (SCI)?
Top Secret and able to hand deliver it
Which of the following is least likely to pose a risk to share on a social network site?
Your pet's name
Which of these is NOT a potential indicator that your device may be under a malicious code attack?
a notification for a system update that has been publicized
Which of the following describes Sensitive Compartmented Information (SCI)? SCI is a program that _______ various types of classified information for _____ protection and dissemination or distribution control.
segregates; added
How can you protect your home computer?
Turn on the password feature
which of the following is a best for physical security
Use your own security badge or key code for facility access